Conferences in DBLP
Siraj A. Shaikh , Vicky J. Bush Analysing the Woo-Lam Protocol Using CSP and Rank Functions. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:3-12 [Conf ] Shuyao Yu , Youkun Zhang , Runguo Ye , Chuck Song A Secure Hash-Based Strong-Password Authentication Scheme. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:13-20 [Conf ] H. A. Eneh , O. Gemikonakli An Approach for the Analysis of Security Standards for Authentication in Distributed Systems. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:21-30 [Conf ] M. Choudary Gorantla , Raju Gangishetti , Manik Lal Das , Ashutosh Saxena An Effective Certificateless Signature Scheme Based on Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:31-39 [Conf ] Raju Gangishetti , M. Choudary Gorantla , Manik Lal Das , Ashutosh Saxena , Ved Prakash Gulati ID-based Serial Multisignature Scheme using Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:40-47 [Conf ] Changshe Ma , Kefei Chen , Shengli Liu , Dong Zheng Transitive Signatures Based on Bilinear Maps. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:48-56 [Conf ] Robson de Oliveira Albuquerque , Maíra Hanashiro , Rafael Timóteo de Sousa Júnior , Cláudia J. Barenco Abbas , Luis Javier García-Villalba MANET - Auto Configuration with Distributed Certification Authority models Considering Routing Protocols Usage. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:57-66 [Conf ] Robson de Oliveira Albuquerque , Daniel Silva Almendra , Leonardo Lobo Pulcineli , Rafael Timóteo de Sousa Júnior , Cláudia J. Barenco Abbas , Luis Javier García-Villalba SisBrAV - Brazilian Vulnerability Alert System. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:67-76 [Conf ] Sushan Sudaharan , Srikrishna Dhammalapati , Sijan Rai , Duminda Wijesekera Honeynet Clusters as an early Warning System for Production Networks. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:77-83 [Conf ] Cláudia J. Barenco Abbas , Alessandra Lafetá , Giuliano Arruda , Luis Javier García-Villalba A Honeypot Implementation as Part of the Brazilian Distributed Honeypots Project and Statistical Analysis of Attacks Against a University's Network. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:84-93 [Conf ] Ulf T. Mattsson A Real-time Intrusion Prevention System for Commercial Enterprise Databases and File Systems. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:94-101 [Conf ] Jiande Zheng Public-Key Encryption Based on Matrix Diagonalization Problem. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:102-112 [Conf ] Guangsen Zhang , Manish Parashar Cooperative Defense against Network Attacks. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:113-122 [Conf ] Christos K. Dimitriadis , Despina Polemi A Protocol for Incorporating Biometrics in 3G with Respect to Privacy. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:123-135 [Conf ] Vaibhav Gowadia , Csilla Farkas Tree Automata for Schema-level Filtering of XML Associations . [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:136-145 [Conf ] Chunxiao Ye , Zhongfu Wu , Yunqing Fu An Attribute-Based-Delegation-Model and Its Extension. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:146-159 [Conf ] Sabah S. Al-Fedaghi A Systematic Approach to Anonymity. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:160-172 [Conf ] Claudine Conrado , Milan Petkovic , Michiel van der Veen , Wytse van der Velde Controlled Sharing of Personal Content using Digital Rights Management. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:173-185 [Conf ] Marco Voss , Wolfram Wiesemann Using Reputation Systems to Cope with Trust Problems in Virtual Organizations. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:186-195 [Conf ] Yanjun Zuo , Brajendra Panda External Object Trust Zone Mapping for Information Clustering. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:196-206 [Conf ] Eduardo B. Fernández , Tami Sorgente , María M. Larrondo-Petrie A UML-Based Methodology for Secure Systems: The Design Stage . [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:207-216 [Conf ] Rodolfo Villarroel , Eduardo Fernández-Medina , Juan Trujillo , Mario Piattini Towards a UML 2.0/OCL extension for designing Secure Data Warehouses. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:217-228 [Conf ] Khaled Alghathbar , Duminda Wijesekera , Csilla Farkas Secure UML Information Flow using FlowUML. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:229-238 [Conf ] Wes Sonnenreich , Jason Albanese , Bruce Stout Return On Security Investment (ROSI): A Practical Quantitative Model. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:239-252 [Conf ] Subhas C. Misra , Vinod Kumar , Uma Kumar An Approach for Modeling Information Systems Security Risk Assessment. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:253-262 [Conf ] Peter D. Zegzhda , Dmitry P. Zegzhda , Maxim O. Kalinin Detection of the Operating System Configuration Vulnerabilities with Safety Evaluation Facility. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:263-276 [Conf ] Thuong Doan , Laurent D. Michel , Steven A. Demurjian , T. C. Ting Stateful Design for Secure Information Systems. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:277-286 [Conf ] Alfonso Rodríguez , Eduardo Fernández-Medina , Mario Piattini Towards an integration of Security Requirements into Business Process Modeling. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:287-297 [Conf ] Carlos Gutiérrez , Eduardo Fernández-Medina , Mario Piattini Towards a Process for Web Services Security. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:298-308 [Conf ] Christine E. Drake , Andrew Klein , Jonathan J. Oliver Analysis of the Phishing Email Problem and Discussion of Possible Solutions. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:309-318 [Conf ] Wiebe K. Wiechers , Semir Daskapan Validating the Security of Medusa: A survivability Protocol for Security Systems. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:319-330 [Conf ] Serge Chaumette , Damien Sauveron An Efficient and Simple Way to Test the Security of Java CardsTM. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:331-341 [Conf ]